<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[OpenVPN Access to LAN behind client]]></title><description><![CDATA[<p dir="auto">Hello,<br />
I have no clue how to configure route for this type of setup.<br />
Thanks.<br />
I have the following setup:<br />
Centos openvz vps (venet0)<br />
OpenVPN server IP: 10.8.0.1</p>
<p dir="auto">PFsense router Acts as OpenVPN client<br />
Lan: 192.244.11.0/24<br />
Openvpn client ip : 10.8.0.2<br />
Windows client<br />
Lan : 192.244.11.1<br />
I want the centos Server to be able to access the LAN of the PFsense. The Windows client in the PFsense LAN needs to be able communicate with the centos Server box as well.</p>
<pre><code class="language-java">port 1194
proto udp
dev tun
user nobody
group nobody
persist-key
persist-tun
keepalive 10 120
topology subnet
server 10.8.0.0 255.255.255.0
client-to-client
push "route 192.244.11.0 255.255.255.0"
;route 192.244.11.0 255.255.255.0 10.8.0.1
;	-------------------------
ifconfig-pool-persist ipp.txt
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
push "redirect-gateway def1 bypass-dhcp" 
crl-verify crl.pem
ca ca.crt
cert server_g9hq31FXVL3AsXq0.crt
key server_g9hq31FXVL3AsXq0.key
tls-auth tls-auth.key 0
dh dh.pem
auth SHA256
cipher AES-128-CBC
tls-server
tls-version-min 1.2
tls-cipher TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
status openvpn.log
verb 3
</code></pre>
<p dir="auto">pfsense client</p>
<pre><code class="language-java">client
proto udp
remote ***************** 1194
dev tun
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
verify-x509-name server_g9hq31FXVL3AsXq0 name
auth SHA256
auth-nocache
cipher AES-128-CBC
tls-client
tls-version-min 1.2
tls-cipher TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
setenv opt block-outside-dns
verb 3
&lt;ca&gt;
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
&lt;/ca&gt;
&lt;cert&gt;
Certificate:
-----BEGIN CERTIFICATE-----
BTusOrY68gxGlFw3smOloawS6xhnm4hVFWMhYg=
-----END CERTIFICATE-----
&lt;/cert&gt;
&lt;key&gt;
-----BEGIN PRIVATE KEY-----
G3uB2I+MqZpoO83YsZ//HqiE4H
-----END PRIVATE KEY-----
&lt;/key&gt;
key-direction 1
&lt;tls-auth&gt;
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
&lt;/tls-auth&gt;
</code></pre>
]]></description><link>https://forum.netgate.com/topic/138892/openvpn-access-to-lan-behind-client</link><generator>RSS for Node</generator><lastBuildDate>Wed, 11 Mar 2026 22:02:25 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/138892.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 19 Dec 2018 18:35:52 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to OpenVPN Access to LAN behind client on Thu, 20 Dec 2018 03:14:39 GMT]]></title><description><![CDATA[<p dir="auto">No. I used some tutorial of PIA open vpn client.</p>
]]></description><link>https://forum.netgate.com/post/812399</link><guid isPermaLink="true">https://forum.netgate.com/post/812399</guid><dc:creator><![CDATA[shetu]]></dc:creator><pubDate>Thu, 20 Dec 2018 03:14:39 GMT</pubDate></item><item><title><![CDATA[Reply to OpenVPN Access to LAN behind client on Wed, 19 Dec 2018 18:44:44 GMT]]></title><description><![CDATA[<p dir="auto">Did you go through one of the site-to-site examples? https://www.netgate.com/docs/pfsense/book/openvpn/index.html</p>
<p dir="auto">As I recall the routing should be handled automatically but you'd need to add firewall rules: https://www.netgate.com/docs/pfsense/book/openvpn/allowing-traffic-over-openvpn-tunnels.html</p>
]]></description><link>https://forum.netgate.com/post/812334</link><guid isPermaLink="true">https://forum.netgate.com/post/812334</guid><dc:creator><![CDATA[SteveITS]]></dc:creator><pubDate>Wed, 19 Dec 2018 18:44:44 GMT</pubDate></item></channel></rss>